The post-Charter digital era presents complex and unique challenges to the manner in which the traditional protocol of warfare interacts with international legal norms. The rubric of inter-state cyber policy needs to be augmented in order to account for hostile engagement in this new domain. (continue reading...)

Confidence-building measures can serve as international rules of law governing state actors’ use of “information weapons” and thereby produce the mutual understanding needed for a peaceful infor- mation domain. (continue reading...)

Hazy notions of cyber security and the inconsistency of mandates of international organizations result in oftentimes trivial and non-actionable output from these organizations’ discussions of strategic cyber issues. Venue-shopping for friendly entities by nations compounds the problem of ineffective international cyber-security governance. Better defining the issues and expected remedies as well as a reasonable choice of venue would add consistency and credibility to international cyber deliberations. (continue reading...)A Balkanized Internet? The Uncertain Future of Global Internet StandardsbyJonah Force Hill

The War Powers Resolution should apply to cyber operations in the same way that it applies to physical conflicts because the waging of cyber warfare should not be left to the Executive alone. This article analyzes the critical provisions of the WPR, discusses its narrow interpretation by the current administration, and introduces the concept of ‘logical presence.’ (continue reading...)Leadership and Responsibility for Cybersecurity by Melissa Hathaway

Leaders in government and private industry must work proactively to study, adapt, and enact cyber security measures and integrate them into core infrastructures to meet the continuously evolving nature of cyber threats. When this fails to occur, leaders must be held accountable. (continue reading...)Why Cybersecurity is Hardby Robert Ghanea-Hercock

Cyber security remains an unresolved problem because it is a complex adaptive system that is complicated by multiple technical, policy, and social dimensions. Unfortunately, the wider cyber security community has yet to recognize the real nature of the threat and persists in utiliz- ing rigid strategies. Ghanea-Hercock outlines a number of defenses that must be implemented to address this problem.(continue reading...)Perspective: Not all Vendors and Products are Created Equal by John N. Stewart

In an electronic world, digital security threats have myriad ways of infiltrating infrastructure systems and supply chains. Preventing this requires a renewed focus on verifiable, quantifiable trust at every step of the business process.(continue reading...)The Key Terrain of Cyber by John R. Mills

The Budapest Convention on Cybercrime represents the only international instrument and the best hope for countries to establish common minimum standards of relevant offenses, prevent criminals operating from jurisdictions with lower standards, and enable speedy and twenty- four-seven international cooperation between law enforcement. However, the Convention faces determined and organized opposition from several corners, which have traditionally promoted a greater role in the regulation of the Internet for UN bodies. (continue reading...)Achieving International Cyber Stability byFranklin D. Kramer

Stabilization of the cyber domain is key to the security interests of both the United States and the international community. Building up relevant institutions and norms to ensure a measure of order will rely upon a tri-pronged platform of resilience, cooperation, and transparency. (continue reading...)TRANSCRIPTIONS